Mission and Overview
NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA).
Resource Status
NVD contains:

Last updated: 9/21/2014 6:07:33 AM

CVE Publication rate: 29.77

Email List

NVD provides four mailing lists to the public. For information and subscription instructions please visit NVD Mailing Lists

Workload Index
Vulnerability Workload Index: 9.45
About Us
NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security's National Cyber Security Division. It supports the U.S. government multi-agency (OSD, DHS, NSA, DISA, and NIST) Information Security Automation Program. It is the U.S. government content repository for the Security Content Automation Protocol (SCAP).

National Cyber Awareness System

Vulnerability Summary for CVE-2010-0291

Original release date: 02/15/2010
Last revised: 03/19/2012
Source: US-CERT/NIST

Overview

The Linux kernel before 2.6.32.4 allows local users to gain privileges or cause a denial of service (panic) by calling the (1) mmap or (2) mremap function, aka the "do_mremap() mess" or "mremap/mmap mess."

Impact

CVSS Severity (version 2.0):
CVSS v2 Base Score: 4.6 (MEDIUM) (AV:L/AC:L/Au:N/C:P/I:P/A:P) (legend)
Impact Subscore: 6.4
Exploitability Subscore: 3.9
CVSS Version 2 Metrics:
Access Vector: Locally exploitable
Access Complexity: Low
Authentication: Not required to exploit
Impact Type: Allows unauthorized disclosure of information; Allows unauthorized modification; Allows disruption of service

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

External Source: CONFIRM
Name: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=05d72faa6d13c9d857478a5d35c85db9adada685
External Source: BID
Name: 37906
External Source: MLIST
Name: [oss-security] 20100120 Re: CVE request - kernel: untangle the do_mremap() mess
External Source: MLIST
Name: [oss-security] 20100120 Re: CVE request - kernel: untangle the do_mremap() mess
External Source: CONFIRM
Name: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=f106af4e90eadd76cfc0b5325f659619e08fb762
External Source: CONFIRM
Name: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=097eed103862f9c6a97f2e415e21d1134017b135
External Source: CONFIRM
Name: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=570dcf2c15463842e384eb597a87c1e39bead99b
External Source: CONFIRM
Name: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=2c6a10161d0b5fc047b5bd81b03693b9af99fab5
External Source: CONFIRM
Name: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=2ea1d13f64efdf49319e86c87d9ba38c30902782
External Source: CONFIRM
Name: http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.32.4
Type: Patch Information
External Source: CONFIRM
Name: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=1a0ef85f84feb13f07b604fcf5b90ef7c2b5c82f
External Source: MLIST
Name: [linux-kernel] 20100114 [PATCH 01/52] untangle the do_mremap() mess
External Source: CONFIRM
Name: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=0ec62d290912bb4b989be7563851bc364ec73b56
External Source: BUGTRAQ
Name: 20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX
External Source: CONFIRM
Name: http://groups.google.co.jp/group/fa.linux.kernel/browse_thread/thread/8bf22336b1082090
External Source: CONFIRM
Name: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=aa65607373a4daf2010e8c3867b6317619f3c1a3
External Source: MLIST
Name: [oss-security] 20100120 Re: CVE request - kernel: untangle the do_mremap() mess
External Source: SECUNIA
Name: 38492
External Source: CONFIRM
Name: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=bb52d6694002b9d632bb355f64daa045c6293a4e
External Source: DEBIAN
Name: DSA-2005
External Source: MLIST
Name: [oss-security] 20100119 Re: CVE request - kernel: untangle the do_mremap() mess
External Source: CONFIRM
Name: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=564b3bffc619dcbdd160de597b0547a7017ea010
External Source: CONFIRM
Name: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=9206de95b1ea68357996ec02be5db0638a0de2c1
External Source: CONFIRM
Name: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=e77414e0aad6a1b063ba5e5750c582c75327ea6a
External Source: CONFIRM
Name: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=f8b7256096a20436f6d0926747e3ac3d64c81d24
External Source: MLIST
Name: [oss-security] 20100119 CVE request - kernel: untangle the do_mremap() mess
External Source: REDHAT
Name: RHSA-2010:0161
External Source: CONFIRM
Name: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=ecc1a8993751de4e82eb18640d631dae1f626bd6
External Source: SECUNIA
Name: 39033
External Source: MLIST
Name: [oss-security] 20100121 Re: CVE request - kernel: untangle the do_mremap() mess
External Source: OVAL
Name: oval:org.mitre.oval:def:11824
External Source: CONFIRM
Name: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=54f5de709984bae0d31d823ff03de755f9dcac54
External Source: MLIST
Name: [linux-kernel] 20091205 [RFC][PATCHSET] mremap/mmap mess
External Source: CONFIRM
Name: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=8c7b49b3ecd48923eb64ff57e07a1cdb74782970
External Source: CONFIRM
Name: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=935874141df839c706cd6cdc438e85eb69d1525e
External Source: CONFIRM
Name: https://bugzilla.redhat.com/show_bug.cgi?id=556703
External Source: MLIST
Name: [oss-security] 20100120 Re: CVE request - kernel: untangle the do_mremap() mess
External Source: SECUNIA
Name: 43315
External Source: DEBIAN
Name: DSA-1996
External Source: CONFIRM
Name: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=0067bd8a55862ac9dd212bd1c4f6f5bff1ca1301
External Source: MLIST
Name: [oss-security] 20100120 Re: CVE request - kernel: untangle the do_mremap() mess
External Source: CONFIRM
Name: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=c4caa778157dbbf04116f0ac2111e389b5cd7a29
External Source: CONFIRM
Name: http://www.vmware.com/security/advisories/VMSA-2011-0003.html

References to Check Content

Identifier: oval:org.mitre.oval:def:11824
Check System: http://oval.mitre.org/XMLSchema/oval-definitions-5

Vulnerable software and versions

Skip Navigation Links.
Collapse Configuration 1Configuration 1
Collapse OROR
* cpe:/o:linux:linux_kernel:2.6.20.20
* cpe:/o:linux:linux_kernel:2.6.20.19
* cpe:/o:linux:linux_kernel:2.6.19.7
* cpe:/o:linux:linux_kernel:2.6.20.16
* cpe:/o:linux:linux_kernel:2.6.19.5
* cpe:/o:linux:linux_kernel:2.6.19.6
* cpe:/o:linux:linux_kernel:2.6.19.4
* cpe:/o:linux:linux_kernel:2.6.25.5
* cpe:/o:linux:linux_kernel:2.6.23_rc1
* cpe:/o:linux:linux_kernel:2.6.24_rc4
* cpe:/o:linux:linux_kernel:2.6.24_rc5
* cpe:/o:linux:linux_kernel:2.4.36.4
* cpe:/o:linux:linux_kernel:2.4.36.5
* cpe:/o:linux:linux_kernel:2.4.36.1
* cpe:/o:linux:linux_kernel:2.6.22
* cpe:/o:linux:linux_kernel:2.4.36
* cpe:/o:linux:linux_kernel:2.6.18
* cpe:/o:linux:linux_kernel:2.4.36.3
* cpe:/o:linux:linux_kernel:2.6.23
* cpe:/o:linux:linux_kernel:2.4.36.2
* cpe:/o:linux:linux_kernel:2.6.25.16
* cpe:/o:linux:linux_kernel:2.6.25.17
* cpe:/o:linux:linux_kernel:2.6.22_rc7
* cpe:/o:linux:linux_kernel:2.6.21.6
* cpe:/o:linux:linux_kernel:2.6.22_rc1
* cpe:/o:linux:linux_kernel:2.6.23.10
* cpe:/o:linux:linux_kernel:2.6.21.7
* cpe:/o:linux:linux_kernel:2.6.24_rc1
* cpe:/o:linux:linux_kernel:2.6.24.6
* cpe:/o:linux:linux_kernel:2.6.25.4
* cpe:/o:linux:linux_kernel:2.6.25.13
* cpe:/o:linux:linux_kernel:2.6.25.3
* cpe:/o:linux:linux_kernel:2.6.25.14
* cpe:/o:linux:linux_kernel:2.6.24.1
* cpe:/o:linux:linux_kernel:2.6.24
* cpe:/o:linux:linux_kernel:2.6.25.10
* cpe:/o:linux:linux_kernel:2.6.25.11
* cpe:/o:linux:linux_kernel:2.4.36.6
* cpe:/o:linux:linux_kernel:2.6.22.1
* cpe:/o:linux:linux_kernel:2.2.27
* cpe:/o:linux:linux_kernel:2.6.25.12::x86_64
* cpe:/o:linux:linux_kernel:2.6.25.11::x86_64
* cpe:/o:linux:linux_kernel:2.6.25.8::x86_64
* cpe:/o:linux:linux_kernel:2.6.25.6
* cpe:/o:linux:linux_kernel:2.6.25.7::x86_64
* cpe:/o:linux:linux_kernel:2.6.25.7
* cpe:/o:linux:linux_kernel:2.6.25.6::x86_64
* cpe:/o:linux:linux_kernel:2.6.25.5::x86_64
* cpe:/o:linux:linux_kernel:2.6.25.4::x86_64
* cpe:/o:linux:linux_kernel:2.6.25.3::x86_64
* cpe:/o:linux:linux_kernel:2.6.25.2::x86_64
* cpe:/o:linux:linux_kernel:2.6.25.10::x86_64
* cpe:/o:linux:linux_kernel:2.6.25.1::x86_64
* cpe:/o:linux:linux_kernel:2.6.18:rc5
* cpe:/o:linux:linux_kernel:2.6.18:rc6
* cpe:/o:linux:linux_kernel:2.6.18:rc7
* cpe:/o:linux:linux_kernel:2.6.18:rc1
* cpe:/o:linux:linux_kernel:2.6.18:rc2
* cpe:/o:linux:linux_kernel:2.6.25.8
* cpe:/o:linux:linux_kernel:2.6.18:rc3
* cpe:/o:linux:linux_kernel:2.6.18:rc4
* cpe:/o:linux:linux_kernel:2.6.25.1
* cpe:/o:linux:linux_kernel:2.6.25.12
* cpe:/o:linux:linux_kernel:2.6.24.2
* cpe:/o:linux:linux_kernel:2.6.22.22
* cpe:/o:linux:linux_kernel:2.6.22.21
* cpe:/o:linux:linux_kernel:2.6.22.20
* cpe:/o:linux:linux_kernel:2.6.22.19
* cpe:/o:linux:linux_kernel:2.6
* cpe:/o:linux:linux_kernel:2.6.24.3
* cpe:/o:linux:linux_kernel:2.6.24.4
* cpe:/o:linux:linux_kernel:2.6.24.5
* cpe:/o:linux:linux_kernel:2.6.25
* cpe:/o:linux:linux_kernel:2.6.22.2
* cpe:/o:linux:linux_kernel:2.6.22.8
* cpe:/o:linux:linux_kernel:2.6.22.9
* cpe:/o:linux:linux_kernel:2.6.22.14
* cpe:/o:linux:linux_kernel:2.6.22.15
* cpe:/o:linux:linux_kernel:2.6.22.17
* cpe:/o:linux:linux_kernel:2.6.22.18
* cpe:/o:linux:linux_kernel:2.6.22.10
* cpe:/o:linux:linux_kernel:2.6.22.11
* cpe:/o:linux:linux_kernel:2.6.22.12
* cpe:/o:linux:linux_kernel:2.6.22.13
* cpe:/o:linux:linux_kernel:2.6.25.9
* cpe:/o:linux:linux_kernel:2.6.25.9::x86_64
* cpe:/o:linux:linux_kernel:2.6.25::x86_64
* cpe:/o:linux:linux_kernel:2.6.26
* cpe:/o:linux:linux_kernel:2.6.26.1
* cpe:/o:linux:linux_kernel:2.6.26.2
* cpe:/o:linux:linux_kernel:2.6.26.3
* cpe:/o:linux:linux_kernel:2.6.26.4
* cpe:/o:linux:linux_kernel:2.6.26.5
* cpe:/o:linux:linux_kernel:2.6.27
* cpe:/o:linux:linux_kernel:2.6.28 and previous versions
* cpe:/o:linux:linux_kernel:2.6.29.3
* cpe:/o:linux:linux_kernel:2.6.29:rc8-kk
* cpe:/o:linux:linux_kernel:2.6.29
* cpe:/o:linux:linux_kernel:2.6.29:git1
* cpe:/o:linux:linux_kernel:2.6.29.rc2-git1
* cpe:/o:linux:linux_kernel:2.6.29:rc1
* cpe:/a:linux:kernel:2.6.24.7
* cpe:/a:linux:kernel:2.6.25.15
* cpe:/o:linux:linux_kernel:2.6.23.15
* cpe:/o:linux:linux_kernel:2.6.23.17
* cpe:/o:linux:linux_kernel:2.6.23.16
* cpe:/o:linux:linux_kernel:2.6.23.11
* cpe:/o:linux:linux_kernel:2.6.23.9
* cpe:/o:linux:linux_kernel:2.6.23.13
* cpe:/o:linux:linux_kernel:2.6.25.2
* cpe:/o:linux:linux_kernel:2.6.23.12
* cpe:/o:linux:linux_kernel:2.6.21.5
* cpe:/o:linux:linux_kernel:2.6.20.21
* cpe:/o:linux:linux_kernel:2.6.23.8
* cpe:/o:linux:linux_kernel:2.6.20.18
* cpe:/o:linux:linux_kernel:2.6.20.17
* cpe:/o:linux:linux_kernel:2.6.30:rc7-git6 and previous versions
* cpe:/a:intel:e1000:7.4.27
* cpe:/a:intel:e1000:7.4.35 and previous versions
* cpe:/a:intel:e1000:7.3.20
* cpe:/a:intel:e1000:7.3.15
* cpe:/a:intel:e1000:7.2.9
* cpe:/a:intel:e1000:7.2.7
* cpe:/a:intel:e1000:7.1.9
* cpe:/a:intel:e1000:7.0.41
* cpe:/a:intel:e1000:7.0.33
* cpe:/a:intel:e1000:6.3.9
* cpe:/a:intel:e1000:6.2.15
* cpe:/a:intel:e1000:6.1.16
* cpe:/a:intel:e1000:6.0.60
* cpe:/a:intel:e1000:6.0.54
* cpe:/a:intel:e1000:5.7.6
* cpe:/a:intel:e1000:5.6.10
* cpe:/a:intel:e1000:5.6.10.1
* cpe:/a:intel:e1000:5.5.4
* cpe:/a:intel:e1000:5.4.11
* cpe:/a:intel:e1000:5.3.19
* cpe:/a:intel:e1000:5.2.52
* cpe:/a:intel:e1000:5.2.30.1
* cpe:/a:intel:e1000:5.2.22
* cpe:/o:linux:linux_kernel:2.6.30:rc3
* cpe:/o:linux:linux_kernel:2.6.30:rc2
* cpe:/o:linux:linux_kernel:2.6.30:rc1
* cpe:/o:linux:linux_kernel:2.6.29:rc2_git7
* cpe:/o:linux:linux_kernel:2.6.29.rc1
* cpe:/o:linux:linux_kernel:2.6.29:rc2
* cpe:/o:linux:linux_kernel:2.6.32:rc7
* cpe:/o:linux:linux_kernel:2.6.32:rc8
* cpe:/o:linux:linux_kernel:2.6.32:rc4
* cpe:/o:linux:linux_kernel:2.6.32:rc3
* cpe:/o:linux:linux_kernel:2.6.32:rc1
* cpe:/o:linux:linux_kernel:2.6.32:git-6
* cpe:/o:linux:linux_kernel:2.6.32
* cpe:/o:linux:linux_kernel:2.6.32:rc6
* cpe:/o:linux:linux_kernel:2.6.32:rc5
* cpe:/o:linux:linux_kernel:2.6.32.1
* cpe:/o:linux:linux_kernel:2.6.32.2
* cpe:/o:linux:linux_kernel:2.6.32.3 and previous versions
* Denotes Vulnerable Software
Changes related to vulnerability configurations

Technical Details

Vulnerability Type (View All)
  • Permissions, Privileges, and Access Control (CWE-264)